Skip to content

Instantly share code, notes, and snippets.

@f13end
Last active June 29, 2019 08:50
Show Gist options
  • Save f13end/35b23a673a7b496908e598898e28fb69 to your computer and use it in GitHub Desktop.
Save f13end/35b23a673a7b496908e598898e28fb69 to your computer and use it in GitHub Desktop.

Windows Privilege Escalation Techniques

  1. Buffer Overflow
  2. DLL Injection
  3. DLL Hijacking
  4. Token Manipulation
  5. Insecure Files Permission
  6. Insecure Folders Permission
  7. Insecure Service Permission
  8. Insecure Registery Permission
  9. Runas
  10. AlwaysInstallElevated
  11. Unquoted Service Paths
  12. Kernel Exploitation
  13. Stored Password
  14. Runas Admin
  15. UAC Bypass
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment